CVE-2017-20167

A vulnerability, which was classified as problematic, was found in Minichan. This affects an unknown part of the file reports.php. The manipulation of the argument headline leads to cross site scripting. It is possible to initiate the attack remotely. The identifier of the patch is fc0e732e58630cba318d6bf49d1388a7aa9d390e. It is recommended to apply a patch to fix this issue. The identifier VDB-217785 was assigned to this vulnerability.
References
Link Resource
https://github.com/Minichan/Minichan/commit/fc0e732e58630cba318d6bf49d1388a7aa9d390e Broken Link Patch
https://github.com/Minichan/Minichan/pull/54 Broken Link Third Party Advisory
https://vuldb.com/?ctiid.217785 Permissions Required Third Party Advisory
https://vuldb.com/?id.217785 Permissions Required Third Party Advisory
https://github.com/Minichan/Minichan/commit/fc0e732e58630cba318d6bf49d1388a7aa9d390e Broken Link Patch
https://github.com/Minichan/Minichan/pull/54 Broken Link Third Party Advisory
https://vuldb.com/?ctiid.217785 Permissions Required Third Party Advisory
https://vuldb.com/?id.217785 Permissions Required Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:minichan:minichan:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:22

Type Values Removed Values Added
References () https://github.com/Minichan/Minichan/commit/fc0e732e58630cba318d6bf49d1388a7aa9d390e - Broken Link, Patch () https://github.com/Minichan/Minichan/commit/fc0e732e58630cba318d6bf49d1388a7aa9d390e - Broken Link, Patch
References () https://github.com/Minichan/Minichan/pull/54 - Broken Link, Third Party Advisory () https://github.com/Minichan/Minichan/pull/54 - Broken Link, Third Party Advisory
References () https://vuldb.com/?ctiid.217785 - Permissions Required, Third Party Advisory () https://vuldb.com/?ctiid.217785 - Permissions Required, Third Party Advisory
References () https://vuldb.com/?id.217785 - Permissions Required, Third Party Advisory () https://vuldb.com/?id.217785 - Permissions Required, Third Party Advisory
CVSS v2 : 4.0
v3 : 6.1
v2 : 4.0
v3 : 3.5

20 Dec 2023, 02:10

Type Values Removed Values Added
References (MISC) https://github.com/Minichan/Minichan/pull/54 - Third Party Advisory (MISC) https://github.com/Minichan/Minichan/pull/54 - Broken Link, Third Party Advisory
References (MISC) https://github.com/Minichan/Minichan/commit/fc0e732e58630cba318d6bf49d1388a7aa9d390e - Patch, Third Party Advisory (MISC) https://github.com/Minichan/Minichan/commit/fc0e732e58630cba318d6bf49d1388a7aa9d390e - Broken Link, Patch

20 Oct 2023, 12:15

Type Values Removed Values Added
Summary A vulnerability, which was classified as problematic, was found in Minichan. This affects an unknown part of the file reports.php. The manipulation of the argument headline leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is fc0e732e58630cba318d6bf49d1388a7aa9d390e. It is recommended to apply a patch to fix this issue. The identifier VDB-217785 was assigned to this vulnerability. A vulnerability, which was classified as problematic, was found in Minichan. This affects an unknown part of the file reports.php. The manipulation of the argument headline leads to cross site scripting. It is possible to initiate the attack remotely. The identifier of the patch is fc0e732e58630cba318d6bf49d1388a7aa9d390e. It is recommended to apply a patch to fix this issue. The identifier VDB-217785 was assigned to this vulnerability.

Information

Published : 2023-01-14 20:15

Updated : 2024-11-21 03:22


NVD link : CVE-2017-20167

Mitre link : CVE-2017-20167

CVE.ORG link : CVE-2017-20167


JSON object : View

Products Affected

minichan

  • minichan
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')